Service providers, including any subcontractors, provide an appropriate level of protection for any data entrusted to them or their services.
Topic
Contractual security requirements with service providers
Applicable to
all
History
Priority
must
Dec 2022
Service providers, including any subcontractors, provide an appropriate level of protection for any data entrusted to them or their services.
An existing control relating to service providers providing an appropriate level of protection for any data entrusted to them or their services was amended to capture subcontractors used by service providers.
Dec 2021
Service providers provide an appropriate level of protection for any data entrusted to them or their services.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
Dec 2020
Service providers provide an appropriate level of protection for any official, sensitive or classified information entrusted to them or their services.
Security control 1395 was moved from under the ‘cyber supply chain risk management’ topic to under the ‘contractual security requirements’ topic in order to pair more closely with security control 0072.
Nov 2020
Service providers provide an appropriate level of protection for any official, sensitive or classified information entrusted to them or their services.
Jul 2020
Service providers provide an appropriate level of protection for any official, sensitive or classified information entrusted to them or their services.
Security control 1395 was amendedslightly.
Jun 2020
If using an outsourced information technology or cloud service, the service provider provides an appropriate level of protection for any official, sensitive or classified information entrusted to them or their services.
Mar 2020
If using an outsourced information technology or cloud service, the service provider provides an appropriate level of protection for any official, sensitive or classified information entrusted to them or their services.
The ‘using outsourced information technology and cloud services’ content was amended to remove references to the ACSC’s Certified Cloud Services List.
Jan 2020
If using outsourced cloud services, only those listed on the ACSC’s Certified Cloud Services List are used.
2017
Agencies must only use outsourced cloud services listed on ASD’s CCSL.
Control Text Changed. No public explaination.
2015
Agencies must only use outsourced cloud services listed on ASD’s Certified Cloud Services List(CCSL).